Hardware transactional memory, which holds the promise to simplify and scale up multicore synchronization, has recently become available in main stream processors in the form of Intel's restricted transactional me...
详细信息
ISBN:
(纸本)9781450323161
Hardware transactional memory, which holds the promise to simplify and scale up multicore synchronization, has recently become available in main stream processors in the form of Intel's restricted transactional memory (RTM). Will RTM be a panacea for multicore scaling? This paper tries to shed some light on this question by studying the performance scalability of a concurrent skip list using competing synchronization techniques, including fine-grained locking, lock-free and RTM (using both Intel's RTM emulator and a real RTM machine). Our experience suggests that RTM indeed simplifies the implementation, however, a lot of care must be taken to get good performance. Specifically, to avoid excessive aborts due to RTM capacity miss or conflicts, programmers should move memory allocation/deallocation out of RTM region, tuning fallback functions, and use compiler optimization. Copyright 2013 ACM.
A number of approaches for endowing systems with self-Adaptive behavior have been proposed over the past years. Among such efforts, architecture-centric solutions with explicit representation of feedback loops have cu...
详细信息
Routing in wireless multi-hop networks has been an active area of research over the last decade. Although, many test-beds were setup recently, the knowledge about the dynamic behavior of routing algorithms and the per...
详细信息
In surveillance, sports, finances, etc., distributed event-based systems are used to detect meaningful events with low latency in high data rate event streams. Both known approaches to deal with the predominant out-of...
详细信息
Summary form only given. As data scientists, we live in interesting times. Data has been the No. 1 fast growing phenomenon on the Internet for the last decade. Big data analytics have the potential to reveal deep insi...
详细信息
Summary form only given. As data scientists, we live in interesting times. Data has been the No. 1 fast growing phenomenon on the Internet for the last decade. Big data analytics have the potential to reveal deep insights hidden by big data that exceeds the processing capacity of existing systems, such as peer influence among customers, revealed by analyzing shoppers' transactions, social and geographical data. In the past 40 years, data was primarily used to record and report business activities and scientific events, and in the next 40 years data will be used also to derive new insights, to influence business decisions and to accelerate scientific discovery. The key challenge is to provide the right platforms and tools to make reasoning of big data easy and simple. In this keynote talk, I will explore reuse opportunities and challenges from multiple dimensions towards delivering big data analytics as a service. I will illustrate by example the importance and challenges of utilizing programmable algorithm abstractions for many seemingly domain-dependent data analytics tasks. Another reuse opportunity is to exploit unconventional data structures and big data processing constructs to simplify and speed up the big data processing.
Wireless ad-hoc networks are typically deployed in a decentralized way, without an authority that determines the location of nodes or the time they join the network. Additionally, existing nodes may fail during networ...
详细信息
Wireless ad-hoc networks are typically deployed in a decentralized way, without an authority that determines the location of nodes or the time they join the network. Additionally, existing nodes may fail during network lifetime. Consequently, the geographical span (area) of the network is irregular and unknown. However, if known, this information can be used to improve efficiency of many wireless applications; in some existing applications this information is necessary for their operation in the real use cases. For this purpose, we propose a distributed algorithm that determines the geographical network area. It is the first algorithm that simultaneously discovers network border, approximates the network area with a data structure of a constant size, and disseminates this information to all network nodes. Our algorithm uses only the nodes' local information, has a constant computational complexity and is resilient to link unreliability. The algorithm is evaluated by simulation on realistic network topologies of different sizes. The simulations demonstrate that the algorithm has high accuracy in its estimation of the network area, scales well with the number of nodes, and that it creates a low communication overhead.
The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large-scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November ...
详细信息
A number of popular engineering processes and methodologies emerged over the past years which attracted interest in research and industry. For process enactment, enterprises have to match requirements of engineering p...
详细信息
ISBN:
(纸本)9789898565105
A number of popular engineering processes and methodologies emerged over the past years which attracted interest in research and industry. For process enactment, enterprises have to match requirements of engineering processes with existing resources. Therefore, it has to be analyzed if employees have sufficient skills or if infrastructure has sufficient capabilities to match the requirements of a situational process. Both, maintaining a skill and resource database and matching requirements against this database are an enormously challenging and time-consuming task. Additionally, this matching has to be carried out regularly as employees join and leave the company and skills change over time. Based upon a formal, logical base, we present an approach that combines ontological and metamodeling technical spaces and enables an automatic analysis of engineering processes regarding the existence of necessary resources.
We introduce a linear measurement-based method for interference estimation in wireless mesh networks. The approach is based on measuring the channel occupancy and requires only O(n) measurements for a network with n n...
详细信息
Recently it became a hot topic to protect VMs from a compromised or even malicious hypervisor. However, most previous systems are vulnerable to rollback attack, since it is hard to distinguish from normal suspend/resu...
详细信息
暂无评论